Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News

 

President Joe Biden’s appeal for Vladimir Putin to crack down on cyberattacks emanating from within Russia appears to have failed to persuade the Kremlin to give it up. 
In a report published Friday, RiskIQ stated it discovered ongoing hacking infrastructure that Western governments associated last summer to the Russian SVR intelligence agency-linked APT29 or Cozy Bear, which it utilized to obtain Covid-19 research data.
The malware, also known as WellMess or WellMail, led to official warnings in the United States, the United Kingdom, and Canada in July 2020. In April, the FBI urged companies to fix five known vulnerabilities that the SVR had exploited, according to US officials. 
RiskIQ detected three dozen command and control servers supplying WellMess which were under APT29 control, as per the firm. Following a US-Russia summit at which cyberattacks were discussed, the focus was on infrastructure. 
“The behaviour found was noteworthy considering the circumstances in which it emerged, following on the heels of President Biden’s public condemnation of Russian hacking at a recent summit with President Putin,” stated RiskIQ’s Team Atlas. 
Cozy Bear has not been openly accused of being involved in any recent ransomware operations, which were the focus of the White House’s discussions with Russia. The organization has set itself apart by executing cyber-espionage against targets like the federal contractor SolarWinds and the Democratic Nat

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: Evidence Indicates Russia’s SVR is Still Using ‘WellMess’ Malware, Despite US Warnings